Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Pile Of Garbage
May 28, 2007



Boris Galerkin posted:

Isn’t he like an actual murderer?

He's wanted for questioning in Belize concerning the death of his former neighbours. Based on his Bluelight posts from the time it sounds pretty drat plausible that he did go and get his murder on (His username was stuffmonger): http://www.bluelight.org/vb/threads/541627-Hello-and-an-MDPV-Question

Edit: VVV yeah that's mentioned in the Bluelight thread. VVV

Pile Of Garbage fucked around with this message at 14:23 on Feb 9, 2018

Adbot
ADBOT LOVES YOU

Double Punctuation
Dec 30, 2009

Ships were made for sinking;
Whiskey made for drinking;
If we were made of cellophane
We'd all get stinking drunk much faster!
I think his neighbors killed his dogs or some other hosed up poo poo.

fyallm
Feb 27, 2007



College Slice
Not sure if you all got to witness the glorious social media marketing fiasco that was Cygilent last night..

They have since deleted the tweets, but it's the internet.. It was so amazing

https://twitter.com/mattifestation/status/961833483243941888

ChubbyThePhat
Dec 22, 2006

Who nico nico needs anyone else

fyallm posted:

Not sure if you all got to witness the glorious social media marketing fiasco that was Cygilent last night..

They have since deleted the tweets, but it's the internet.. It was so amazing

https://twitter.com/mattifestation/status/961833483243941888

Beautiful.

Docjowles
Apr 9, 2009

Today on "computers were a bad idea", your airgapped system in a drat Faraday cage can STILL be made to exfiltrate data

quote:

Air-gapped computers are computers which are kept isolated from the Internet, because they store and process sensitive information. When highly sensitive data is involved, an air-gapped computer might also be kept secluded in a Faraday cage. The Faraday cage prevents the leakage of electromagnetic signals emanating from various computer parts, which may be picked up by an eavesdropping adversary remotely. The air-gap separation, coupled with the Faraday shield, provides a high level of isolation, preventing the potential leakage of sensitive data from the system. In this paper, we show how attackers can bypass Faraday cages and air-gaps in order to leak data from highly secure computers. Our method is based on an exploitation of the magnetic field generated by the computer CPU.

https://arxiv.org/abs/1802.02700

CLAM DOWN
Feb 13, 2007




Docjowles posted:

Today on "computers were a bad idea", your airgapped system in a drat Faraday cage can STILL be made to exfiltrate data


https://arxiv.org/abs/1802.02700

As much as this industry is a dumpster fire, poo poo like this is so god drat cool

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum

Docjowles posted:

Today on "computers were a bad idea", your airgapped system in a drat Faraday cage can STILL be made to exfiltrate data


https://arxiv.org/abs/1802.02700

flakeloaf posted:

first, install malware on the airgapped machine

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Preinstall in ME during manufacturing process.

Thermopyle
Jul 1, 2003

...the stupid are cocksure while the intelligent are full of doubt. —Bertrand Russell

Build your computer from scratch with raw materials.

vanity slug
Jul 20, 2010

Thermopyle posted:

Build your computer from scratch with raw materials.
the code is coming from inside the silicon

Pile Of Garbage
May 28, 2007



Gotta source mats from an independent galaxy. Ofc if you're looking to mitigate against high-level localised relativity deconstruction attacks (?) then we'll need an independent universe.

Sheep
Jul 24, 2003
There was this too, where you transfer data using the fan at 900 bits/hr.

Docjowles
Apr 9, 2009

Thanks for quoting a bad yospos post at me

I admit to being a total dipshit in the security realm. And yeah this is something 99% of us won’t ever have to worry about. Just posting it because a) the attack itself is fascinating. And b) remember that time the NSA was caught intercepting hardware and installing backdoors? Maybe that airgapped computer wasn’t as secure as you thought.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

It was an interesting item. Don’t internalize the forums.

Absurd Alhazred
Mar 27, 2010

by Athanatos

Subjunctive posted:

It was an interesting item. Don’t internalize the forums.

Too late, the forums jumped the airgap into their subconscious. :smith:

Samizdata
May 14, 2007

Absurd Alhazred posted:

Too late, the forums jumped the airgap into their subconscious. :smith:

Yeah, had he gotten either McAfee MindSecure or Symantec Norton Cerebral Security 2018, he would have (had a seizure) been perfectly fine!

Absurd Alhazred
Mar 27, 2010

by Athanatos

Samizdata posted:

Yeah, had he gotten either McAfee MindSecure or Symantec Norton Cerebral Security 2018, he would have (had a seizure) been perfectly fine!

Can't spell "seizure" without "sure"!

Klyith
Aug 3, 2007

GBS Pledge Week

Docjowles posted:

I admit to being a total dipshit in the security realm. And yeah this is something 99% of us won’t ever have to worry about. Just posting it because a) the attack itself is fascinating. And b) remember that time the NSA was caught intercepting hardware and installing backdoors? Maybe that airgapped computer wasn’t as secure as you thought.


it's interesting, but more as a demonstration of how much a cpu or whatnot can be coaxed into doing really crazy stuff.

As for real security, until someone comes up with a way to use some component on an airgapped pc to receive data, all of these exotic methods to send data out of the air gap are kinda academic. Installing malware on an airgapped machine is demonstrably possible. But if your goal is exfiltrating data, you can just do that the same way your malware got into the target machine in the first place (the USB keys or custom trojan hardware). If stuxnet had been aiming to steal "iranian agents.xls" instead of wreck centrifuges, the CIA would have made it save that data back to the USB key or whatever.


But since the data you want to steal probably isn't an excell sheet saved on the desktop, you're probably going to need multiple rounds of passing information back and forth across the airgap to find the thing you want. And while these magnetic flippers or radio generators or led flashers would shorten one leg of the process, it's no magic bullet. At best they're a shortcut -- but since they also require physically placing a bug nearby, even that is questionable.

astral
Apr 26, 2004

Klyith posted:

it's interesting, but more as a demonstration of how much a cpu or whatnot can be coaxed into doing really crazy stuff.

As for real security, until someone comes up with a way to use some component on an airgapped pc to receive data, all of these exotic methods to send data out of the air gap are kinda academic. Installing malware on an airgapped machine is demonstrably possible. But if your goal is exfiltrating data, you can just do that the same way your malware got into the target machine in the first place (the USB keys or custom trojan hardware). If stuxnet had been aiming to steal "iranian agents.xls" instead of wreck centrifuges, the CIA would have made it save that data back to the USB key or whatever.


But since the data you want to steal probably isn't an excell sheet saved on the desktop, you're probably going to need multiple rounds of passing information back and forth across the airgap to find the thing you want. And while these magnetic flippers or radio generators or led flashers would shorten one leg of the process, it's no magic bullet. At best they're a shortcut -- but since they also require physically placing a bug nearby, even that is questionable.

The beauty of those were that they spread on other people's USB drives though.

Klyith
Aug 3, 2007

GBS Pledge Week

astral posted:

The beauty of those were that they spread on other people's USB drives though.

exactly. but if you wanted to steal data, instead of the centrifuge-destroyer payload you'd have a data theft module that, when it recognizes the target airgapped machine, searches and writes your secret dox to the USB drive (encrypted of course). then you'd have an "exfiltration" module that was on every infected machine that passes the hot data along until you can upload to ftp.cia.gov from some tech's home pc.

of course now if you have an airgapped computer with the Mission Impossible NOC List you are expoying all the USB ports and stuff because the cat is out of the bag.



e VVV stuxnet was infecting 60% of the computers in Iran before they discovered it. the data can propagate out just as fast as the original infection, and jump any gap via sneakernet

Klyith fucked around with this message at 23:34 on Feb 10, 2018

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

How do they get the USB key back?

AARP LARPer
Feb 19, 2005

THE DARK SIDE OF SCIENCE BREEDS A WEAPON OF WAR

Buglord

Subjunctive posted:

How do they get the USB key back?

usb with malware is slotted into airgapped machine and then you count on the info you targeted on the airgapped pc to propagate via that same usb (or a later one) to some other machine connected to the internet at which point you can exfiltrate.

astral
Apr 26, 2004

Dadbod Apocalypse posted:

usb with malware is slotted into airgapped machine and then you count on the info you targeted on the airgapped pc to propagate via that same usb (or a later one) to some other machine connected to the internet at which point you can exfiltrate.

But then they know that you were after info, that you (likely) successfully acquired info, and exactly what info you may have acquired.

Or, worse, if it gets caught with the info before it connects to the internet, you'll find yourself fed some false information instead. Not ideal.

Absurd Alhazred
Mar 27, 2010

by Athanatos
https://twitter.com/secristr/status/962544626765914112

Proteus Jones
Feb 28, 2013




Oh Android, you keep being you.

Absurd Alhazred
Mar 27, 2010

by Athanatos
Buttception

https://twitter.com/SCMagazine/status/962413395101257728

ufarn
May 30, 2009
Anyone played with Quad9 for DNS? Sounds neat, but I don't know how much they actually block.

BlankSystemDaemon
Mar 13, 2009



Any and all blocking should be done by returning NXDOMAIN from as close to the client devices as possible to minimize RTT when you're head-of-line blocked, preferably through something like unbound and void-zone-tools (there are other solutions that are available, although in my experience they're usually a lot harder to reason about and debug), and upstream DNS should leave queries wholly untouched.

This way, if the filtering gives rise to issues, you know exactly to go to affect changes and there's no propregation time.

Absurd Alhazred
Mar 27, 2010

by Athanatos
https://twitter.com/campuscodi/status/962617957900730368

https://twitter.com/SwiftOnSecurity/status/962619340553097216

Furism
Feb 21, 2006

Live long and headbang

ufarn posted:

Anyone played with Quad9 for DNS? Sounds neat, but I don't know how much they actually block.

As a side note, I recently setup Pi-Hole at home and it's a blast.

Proteus Jones
Feb 28, 2013




This is my surprised face

Pile Of Garbage
May 28, 2007



ufarn posted:

Anyone played with Quad9 for DNS? Sounds neat, but I don't know how much they actually block.

If you're in Australia I'd avoid it, IBM are having issues there which breaks stuff that uses geo-DNS stuff (e.g. Office 365).

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

ufarn posted:

Anyone played with Quad9 for DNS? Sounds neat, but I don't know how much they actually block.

I run it as the upstream DNS for my house, seems to work fine. No idea how much it actually blocks since those queries just fail but I benchmarked it on my ISP and it was by far the fastest filtered DNS solution and was maybe a ms or two slower than Google's 8.8.8.8/8.8.4.4 so that's fine.

Alpha Mayo
Jan 15, 2007
hi how are you?
there was this racist piece of shit in your av so I fixed it
you're welcome
pay it forward~
Am I right in thinking that Certificate Authorities for websites are basically a scam and I should just go with the cheapest option that doesn't throw a red address bar/error page while allowing HTTPS? Which appears to be Namecheap Comodo PositiveSSL.

I don't need a Green Bar.

Furism
Feb 21, 2006

Live long and headbang
No, don't go for the cheapest one. Nor the most expensive one necessarily. Cheap ones probably have not-so-good security configuration and their CA could be compromised (this has happened in the past).

Just go for Let's Encrypt if you can (they are free, but not cheap when it comes to handling security, if you get my drift).

mewse
May 2, 2006

Alpha Mayo posted:

Am I right in thinking that Certificate Authorities for websites are basically a scam and I should just go with the cheapest option that doesn't throw a red address bar/error page while allowing HTTPS? Which appears to be Namecheap Comodo PositiveSSL.

I don't need a Green Bar.

Let's Encrypt

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

Alpha Mayo posted:

Am I right in thinking that Certificate Authorities for websites are basically a scam and I should just go with the cheapest option that doesn't throw a red address bar/error page while allowing HTTPS? Which appears to be Namecheap Comodo PositiveSSL.

I don't need a Green Bar.

The idea is that all the CAs are obliged to operate by the same set of rules for documenting/issuing certs to have their CA pre-loaded as a trust in your OS or browser, and the software vendors will pull that if you get caught loving up which basically means game over for your company. Going with the absolute cheapest option will increase your risk of them completely mishandling things and getting popped which means you'd have to do some additional work to re-issue certs when it happens. This happened to Symantec last year when they got caught red-handed issuing certs incorrectly and all the browsers stopped trusting any new certs they issued and set a cutoff for existing ones to go untrusted. This forced Symantec to sell off their cert division and complete leave the market. It's not a great system but the idea is the software vendors keep the CAs in check because they have competing interests.

DACK FAYDEN
Feb 25, 2013

Bear Witness
Finally, we've found a new economic model for porn sites to replace banner ads.

Rectus
Apr 27, 2008

Klyith posted:

it's interesting, but more as a demonstration of how much a cpu or whatnot can be coaxed into doing really crazy stuff.

As for real security, until someone comes up with a way to use some component on an airgapped pc to receive data, all of these exotic methods to send data out of the air gap are kinda academic. Installing malware on an airgapped machine is demonstrably possible. But if your goal is exfiltrating data, you can just do that the same way your malware got into the target machine in the first place (the USB keys or custom trojan hardware). If stuxnet had been aiming to steal "iranian agents.xls" instead of wreck centrifuges, the CIA would have made it save that data back to the USB key or whatever.


But since the data you want to steal probably isn't an excell sheet saved on the desktop, you're probably going to need multiple rounds of passing information back and forth across the airgap to find the thing you want. And while these magnetic flippers or radio generators or led flashers would shorten one leg of the process, it's no magic bullet. At best they're a shortcut -- but since they also require physically placing a bug nearby, even that is questionable.

Still really academic, but this might conceivably be used on secure devices like networking equipment to leak encryption keys. Either as pre-installed software or a hardware trojan.

Adbot
ADBOT LOVES YOU

Alpha Mayo
Jan 15, 2007
hi how are you?
there was this racist piece of shit in your av so I fixed it
you're welcome
pay it forward~
Also I have been studying real-world IT security and decided to play around with password cracking. Holy poo poo everything is loving broken and if you aren't using 2FA on EVERYTHING you are hosed. I thought passwords like 64Sephir0th# would be reasonably secure but Hashcat, rules, masks, billions of leaked passwords, and GPUs have basically broken it all.

I had an old SQL backup from a site I ran in in 2002, with 4000 registered users with md5 hashed passwords. Just playing around with hashcat and I've cracked 3850 of the passwords. Best64 x Top 2 billion passwords = 96% cracked in about 10 minutes, on my single Radeon 7870 GPU.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply